Malware

Type: Keyphrase
Name: Malware
First reported 16 hours ago - Updated 1 hour ago - 3 reports

Popular Science Website Infected, Serving Malware

The website of Popular Science magazine was found infecting users with malware via the RIG exploit kit. ... [Published threatpost - The First Stop for Security News - 1 hour ago]
First reported Oct 29 2014 - Updated 16 hours ago - 4 reports

Hackers Using Gmail Drafts To Steal Information

Hackers have adopted an ingenious way of stealing sensitive information from computer users, utilizing the drafts folder of a Gmail account.Researchers have discovered a piece of malware which uses a novel form of “command and control” which enables hackers ... [Published Value Walk - 16 hours ago]
First reported 22 hours ago - Updated 17 hours ago - 4 reports

Stealthy malware uses Gmail drafts as command and control to steal data

Back in August, Germany’s anti-malware solutions provider G Data Software identified stealthy malware that had gone undetected since 2012. They dubbed the remote administration tool (RAT) Win32.Trojan.IcoScript.A and remarked that it was particularly ... [Published NetworkWorld - 17 hours ago]
First reported Oct 29 2014 - Updated 19 hours ago - 12 reports

ICS-CERT Warns of Ongoing Attack Campaign Targeting Industrial Control Systems

ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) has issued a warning about an ongoing attack campaign targeting industrial control systems.According to ICS-CERT, the campaign has compromised numerous industrial control systems environments ... [Published Security Week - 19 hours ago]
First reported 20 hours ago - Updated 20 hours ago - 2 reports

The Value of Endpoint and Network Protection Together

As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in ... [Published Cisco - 20 hours ago]
First reported Oct 28 2014 - Updated 21 hours ago - 5 reports

Dyre Banking Trojan Still Phishing for Data, US-CERT Warns

A new phishing campaign employs the Dyre banking Trojan to steal account credentials from enterprises and financial institutions, according to an alert by the Department of Homeland Security. In the advisory, US-CERT said the phishing campaign ... [Published HOTforSecurity - 21 hours ago]
First reported Oct 28 2014 - Updated 22 hours ago - 2 reports

Tor exit node hacked to inject malicious code in downloads

Tor users urged to protect their connections and verify computers for virus.A Russian researcher has uncovered a malicious exit node, which is claimed to allow hackers to inject potentially malicious code when users download files.According to Josh Pitts, ... [Published Computer Business Review - 22 hours ago]
First reported Oct 29 2014 - Updated Oct 29 2014 - 2 reports

Fire Eye: Malware Could Have Been Developed By Russian Government To Collect Intelligence

Apparently, there is a brand new report that has just surfaced, hailing from California-based cyber security firm Fire Eye. This new report claims that a rather well known bunch of malware might have been developed and released by none other than the ... [Published UberGizmo - Oct 29 2014]
First reported Oct 29 2014 - Updated Oct 29 2014 - 2 reports

Arrests made after 'specialist malware' used in £1.6 million ATM heist

London police made three arrests last week in connection with the theft of up to £1.6 million ($2.58 million) from over 50 ATMs in cities across the UK.The crimes took place over this year's May Day holiday weekend (3 - 5 May) and hit 51 cash machines ... [Published Sophos Anti Virus - Oct 29 2014]
First reported Oct 28 2014 - Updated Oct 29 2014 - 8 reports

Russian government gathers intelligence with malware: report

The Russian government uses malware to extract sensitive information from companies and governments, not for financial gain but for intelligence gathering, according a new report by FireEye.FireEye chart shows why the company's analysts think that APT28 ... [Published CNET Asia - Oct 29 2014]
First reported Oct 28 2014 - Updated Oct 29 2014 - 7 reports

Researchers identify sophisticated Chinese hacking group

In recent weeks, the research consortium has detected Axiom malicious software on at least 43,000 computers around the world belonging to law enforcement and other government agencies, journalists, telecommunication and energy firms, as well as human ... [Published Dominion Post - Oct 29 2014]
First reported Oct 28 2014 - Updated Oct 28 2014 - 5 reports

Threat Outbreak Alert RuleID12142: Email Messages Distributing Malicious Software on October 28, 2014

Entities: Malware, Threat

Quotes

Mornay Viljoen, eScan South Africa, said: "We are extremely delighted to once again receive the AV-Test award with a 100% rating. With the increase in Internet usage, more and more user data is shared online. Moreover, the increased usage of applications and multiple endpoints makes cyber space more vulnerable to threats. Stringent checks introduced by eScan researchers to address the increasing vulnerabilities in the cyber security landscape ensure that our customers experience a safe computing environment."
"Drupal's volunteer security team does an excellent job of finding and preventing security holes, but they are not omniscient. And while this bug was mentioned in a bug report, you must also understand that there is no person, or groups of persons who's job or role it is to read every issue with Drupal core" Aslett commented
...are facing but also how little is being done to prepare businesses for these incidents," said Rob Kraus, SERT director of research, Solutionary. "Nearly three quarters of our team's incident response engagements showed minimal, even zero, preparation by IT teams when it came to identifying and remediating security events."
Magdalena Urbaniak of River Grove a victim of an advance fee loan scam says "I was glad when they called and offered me a $10,000 loan because my credit score is bad. They asked for a fee of a little under $500 on a GreenDot card. I got the card and gave them the info. Then they called saying that my credit was bad so they needed another $486.38 so I gave that to them. The money was supposed to be released into my bank account. I called to check when it wasn't there. They rechecked and said that I had given them the wrong bank account number. I know that I gave them the right number. They asked for another $3000 and I refused. I keep calling for my money and they say they can't help unless I give them more money"

More Content

All (13339) | News (6814) | Reports (3) | Blogs (6495) | Audio/Video (1) | Fact Sheets (4) | Press Releases (17)
sort by: Date | Relevance
Data breaches a real and expensive threat for c... [Published Credit Union Insight - 25 mins ago]
eScan ensures 100% protection [Published IT Web - 27 mins ago]
Advisory says to assume all Drupal 7 websites a... [Published CSO Magazine - 51 mins ago]
3 Bitcoin News that you Should take Notice of [Published Let's Talk Payments - 53 mins ago]
Amid High-Profile Breaches and Shellshock Discl... [Published Pettinga Financial Advisors - 53 mins ago]
Amid High-Profile Breaches and Shellshock Discl... [Published CW Atlanta - 55 mins ago]
Better Business Bureau: Scammers play on fears,... [Published WLS Chicago - 55 mins ago]
Amid High-Profile Breaches and Shellshock Discl... [Published Marketwire - Breaking News Releases - 58 mins ago]
UK consumers particularly prone to piss-poor pa... [Published The Register - Security - 1 hour ago]
Cost of cybercrime continues to rise for French... [Published Commercial Risk Europe - 1 hour ago]
Popular Science Website Infected, Serving Malware [Published threatpost - The First Stop for Security News - 1 hour ago]
Tor Node Red-Flagged for Slinging Malware [Published Infosecurity - Latest - 2 hours ago]
6 months on – Have we learnt from our Heartblee... [Published Business Matters Magazine - 2 hours ago]
BSides DC 2014 - Opening Acts: How Attackers Ge... [Published SecurityTube.Net - 2 hours ago]
Look out, this ransomware spreads via SMS [Published GMA News Online - 2 hours ago]
SoftDigi Smart USB [Published Sofotex - 2 hours ago]
Small firms need to prepare against ‘cyber crime’ [Published Machinery Market - 2 hours ago]
Threat Outbreak Alert RuleID12168: Email Messag... [Published Threat Outbreak Alerts - 2 hours ago]
Lynn U. to launch iPad-powered distance educati... [Published Inside Higher Ed - 2 hours ago]
Cyber-attack disbelief [Published Professional Security - 3 hours ago]
BYOD 'requires' data centre security upgrades [Published ITP.net - 4 hours ago]
9 common scams on social media [Published Asia News Network - 4 hours ago]
Dynamic defence [Published Computer News Middle East - 4 hours ago]
Abstracttechgroup.com – Get You Out Of Upsettin... [Published ListFree.Org - 4 hours ago]
Fed Cites Improved Labor Market While Ending QE... [Published Proactiveinvestors United Kingdom website - 4 hours ago]
Intelligence Driven Threat Management and Response [Published Bitpipe - 5 hours ago]
Internet Assure Launches Done-For-You Security ... [Published PRWeb - 5 hours ago]
Cat-and-mouse game continues [Published Pueblo Chieftain Online - 5 hours ago]
Yesmail Interactive announces partnership with ... [Published Individual.com - 5 hours ago]
Why Businesses Have Been Slow to Embrace BYOD [Published CRM Guru - 6 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Amid High-Profile Breaches and Shellshock Discl... [Published Marketwire - Breaking News Releases - 58 mins ago]
67 Percent of Shellshock Signatures Tied to Known Malicious Sources; Top ISPs Continue to Be Used as Malware Hosts ...
UK consumers particularly prone to piss-poor pa... [Published The Register - Security - 1 hour ago]
Java particularly vulnerable – new report UK consumer patching practices have worsened still further over the last three months, increasing the threat of malware problems, according to a new study by IT security provider Secunia.… ...
Popular Science Website Infected, Serving Malware [Published threatpost - The First Stop for Security News - 1 hour ago]
The website of Popular Science magazine was found infecting users with malware via the RIG exploit kit. ...
BSides DC 2014 - Opening Acts: How Attackers Ge... [Published SecurityTube.Net - 2 hours ago]
Every security incident has to start somewhere. Sometimes the attacker gets into an organization via phishing. Other times they use SQL injection. Or, they may use an off-the-shelf exploit kit, mass malware, drive-by attack, ‘l33t 0-day exploits, access ...
Threat Outbreak Alert RuleID12168: Email Messag... [Published Threat Outbreak Alerts - 2 hours ago]
...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
TECH PM - Videogame Console Sales Remain Strong [Published Wall Street Journal Tech News Briefing - May 16 2014]
1

Press Releases

sort by: Date | Relevance
Bit9 + Carbon Black Free Webinar: "The Need for... [Published GlobeNewswire: Acquisitions News - Oct 17 2014]
The Home Depot Completes Malware Elimination an... [Published Financial Services - Sep 18 2014]
Press release: Government supports UK's next ge... [Published Keeping the UK safe in cyber space - Activity o ... - Sep 03 2014]
The UPS Store, Inc. Notifies Customers Of Poten... [Published GlobeNewswire: Acquisitions News - Aug 20 2014]
MRG Effitas Awards Wontok SafeCentral New Real ... [Published GlobeNewswire: Acquisitions News - Jul 21 2014]
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.